Featured Content
  • ESG in banking
    ESG-conscious banking should create new and future-proof value streams to build a sustainable and resilient business.
    Read More
  • Everest Group PEAK Matri
    Everest Group PEAK Matrix
    A comprehensive solution delivering a full spectrum of wealth products as great experiences. It also improves the productivity of financial advisors and streaml
    Read More
  • Subsidiary of an American Bank in Indonesia
    Find out how a leading American bank adapts to a digitalized trade and supply chain finance operations as a part of its larger transformation by leveraging Finacle Trade Finance Solution Suite.
    Read More
Featured Content
  • Recomposing Banking: Leading the Digital Continuum
    Report gives you a glimpse of the major areas where recomposing banking will create significant impact and value, Infosys Finacle has put together a report on..
    Read More
  • Core Banking on Cloud: Navigating to the Fast Lane
    Take a deep dive into cloud-based core banking and explore the imperatives, opportunities and challenges, and the hallmarks of a robust solution.
    Read More
  • Embracing Payments Composability
    A step-by-step guide for maximizing Real Time Payment opportunities by embracing Payments Composability...
    Read More
Featured Content
  • Innovation in Retail Banking Report 2024
    For a banking leader, staying competitive means driving innovation—adopting new business models, enhancing digital engagement, achieving operational agility, fo
    Read More
  • Microservices Mastery
    Microservices Mastery
    For decades, banking systems have relied on monolithic architectures-vast, interconnected applications that once drove efficiency but now hinder progress.
    Read More
  • Core Banking on Cloud: Navigating to the Fast Lane
    Take a deep dive into cloud-based core banking and explore the imperatives, opportunities and challenges, and the hallmarks of a robust solution.
    Read More
Featured Content
  • Banking on Cloud
    This report from Infosys Finacle delves into the need for accelerating cloud adoption, highlights the current state of the industry, and puts forth key recommen
    Read More
  • Omdia Universe | Cloud-based Core Banking
    In the report, Omdia highlights the following key capabilities of leading cloud-based core banking providers:
    Read more
Featured Content
  • Emirates NBD
    Emirates NBD consolidates its operations on a single version for scalability, agility, and standardization.
    Read More
  • A Global Top 5 Bank
    Discover how a global top 5 bank headquartered in the US accelerated payments transformation.
    Read More
  • Union Bank of India
    Union Bank of India launches Union Virtual Connect (UVConn) by leveraging WhatsApp to provide customers personalized banking services.
    Read More

What Are Personal Bots?

“Personal bots work on employee’s machine, mostly in attended form and perform tasks for the employee — pulling data from multiple sources to create reports, storing client contact data and even creating regular presentations.

Personal bots can be looked at as a digital concierge for employees in an organization. Through advanced mobile interface and virtual assistants, employees can interact with these personal bots installed on their office machines/systems. The personal bot triggered on-demand or scheduled by the employee, can perform tasks on behalf of the employee, even in his/her absence. Just like a digital concierge, this personal bot on the employee’s machine will be well-equipped to take requests and execute.”

The management of security risks is a top-priority issue for the development of RPA. When it comes to personalized bots in RPA, one of the serious concern is to ensure that the confidential data is not misused due to the actions of a personalized bot.

Some generic processes compliant in a personalized bot would be regular business procedures such as file transferring, data processing, process related to payroll, etc. All these require that the automation platforms have access to confidential information (inventory lists, addresses, financial information, passwords, etc.) about a company’s employees, customers, and vendors.

Consequently, the Issue of Security Can Be Broken Down Into Two Highly Inter-Connected Points:

  • Data security: It’s crucial to ensure proper use of the data. Privacy, such as, well-protected personal and corporate data, is a natural concern for business leaders who are prone to working “hand in hand” with machines.
  • Access security: It revolves around eliminating the use of unauthorized user’s and their possibility of accessing and manipulating private data dealt with by robots. This further prevents the misuse of automated platform functionalities. Security of access is needed to safeguard RPA businesses from employees’ unintentional error as well as hacker attacks.

As a result, strong monitoring and security measures of the personalized bot becomes evident.

How Can a Personalized Bot Ecosystem Be Secured?

In a personalized bot, the starting point would be Architecture and Authentication. In a personal bot scenario, one of the issues could be ‘individual authentication’, wherein the robots use employee log-ons and, it becomes increasingly difficult to distinguish human activities from those of the bot. Security is given a boost when each robot is given its own individual log-in, and its own permissions from the system.

The below approach can help effectively monitor and secure the RPA platform:

Integrity: A person needs to ensure the results/data coming from the bot has not been modified/altered.

  • Traceability: The person should be able to monitor and track bot activities to identify the misuse of robotics affecting confidentially, integrity or availability of other systems/data.
  • Confidentiality: The person needs to protect sensitive data from being deliberately or accidentally disclosed.
  • Security: The person should ensure that the access to a bot is secured and that only he can run the bot.
  • Other factors that contribute to enhancing personalized bot security are: The person needs to work on scheduled tasks, should maintain a clear desk policy, and ensure protection against malware and Trojans.

What Monitoring and Security Features Does the Enterprise Edition Offer? What Is Needed in a Personal Bot?

Currently, the enterprise editions of most of the well-known RPA tools have robust monitoring and security features, which allows organizations to have full control over the security features of the bot. But, when it comes to a personalized bot, the features have to be customized to meet the needs accordingly. For example, AssistEdge 18.0 Enterprise Edition has ‘Control Tower’ component, which has monitoring and security features covered. A component of the Control Tower, i.e. the credential manager ensures the safeguarding of credentials, and end-to-end monitoring of robots can be seen through the dashboard component. Also, all the details related to each transaction executed by the bot are available in the process view component, but for personal bots, all these components will need a re-look.

One might say that by using the features mentioned above in AssistEdge 18.0, the bot is visible, traceable and secure — then why is a re-look needed? Well, automated logins are entirely traceable. The challenge arises when one part of the process is administered by humans, then handed over to robots, then back to humans. The problem here is really about simplification, and lack of straight-through processing or integration, where a single sign-on allows continuous workflows without the stop-start that characterizes handovers. Also, in case of monitoring, the enterprise concept of a dashboard might not be essential, rather personalized information for the individual handling the bot should suffice.

Fundamentally, it comes down to a thorough homework and preparation while handling personal bots to ensure a more robust and secure ecosystem. Today, with enormous opportunities in RPA, the market is exploding with providers who promise to offer quick and easy implementations in cases, where processes can be replaced by a bot. But, what needs to be looked into is how much success will the concept of ‘Robot for every person’ bring.

Sources:

https://www.ey.com/Publication/vwLUAssets/ey-how-do-you-protect-robots-from-cyber-attack/$FILE/ey-how-do-you-protect-robots-from-cyber-attack.pdf

https://medium.com/@cigen_rpa/security-risks-in-robotic-process-automation-rpa-how-you-can-prevent-them-dc892728fc5a

https://www2.deloitte.com/content/dam/Deloitte/us/Documents/public-sector/us-fed-it-security-for-the-digital-laborer.pdf

https://www.edgeverve.com/finacle/assistedge/blogs/digital-concierge-embracing-future-bots/

About the Author
Anup Prasanna Kumar
Senior Analyst - Product Management
EdgeVerve
false
Let’s Discuss
Fill out the form below and we will get back to you shortly. Alternately, you can also contact our regional offices
Please enter your first name
Please enter your last name
Please enter the company name
Please enter your designation
Please enter phone number
Please enter email id
Please select the question
Finacle_Contact_us